Sciweavers

123 search results - page 18 / 25
» Automated Support for Classifying Software Failure Reports
Sort
View
CSL
2010
Springer
13 years 9 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
TASLP
2010
105views more  TASLP 2010»
13 years 2 months ago
Non-Negative Tensor Factorization Applied to Music Genre Classification
Music genre classification techniques are typically applied to the data matrix whose columns are the feature vectors extracted from music recordings. In this paper, a feature vecto...
Emmanouil Benetos, Constantine Kotropoulos
WOSP
2005
ACM
14 years 1 months ago
Performance evaluation of UML software architectures with multiclass Queueing Network models
Software performance based on performance models can be applied at early phases of the software development cycle to characterize the quantitative behavior of software systems. We...
Simonetta Balsamo, Moreno Marzolla
RE
2002
Springer
13 years 7 months ago
Improving the Requirements Engineering Process for an Electronic Clearinghouse
We present experience with improving the requirements engineering process for a telecommunications electronic clearinghouse that connects multiple trading partners. Software failu...
Mariusz A. Fecko, Christopher M. Lott
BMCBI
2006
143views more  BMCBI 2006»
13 years 8 months ago
IsoSVM - Distinguishing isoforms and paralogs on the protein level
Background: Recent progress in cDNA and EST sequencing is yielding a deluge of sequence data. Like database search results and proteome databases, this data gives rise to inferred...
Michael Spitzer, Stefan Lorkowski, Paul Cullen, Al...